Systems and methods for login and authorization
First Claim
1. A method for login comprising:
- receiving a login request from a user;
sending an authorization request to a network server;
receiving first two-dimensional-barcode information from the network server;
displaying a first two-dimensional-barcode image;
acquiring information related to a logged-in state of a user account from a third-party server; and
setting an interface of a third-party application to a user-logged-in state;
wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the first two-dimensional-barcode information extracted from the first two-dimensional-barcode image;
wherein;
the authorization request includes authorization parameters to be validated by the network server; and
the authorization parameters include an application identifier, authorization scope information, an application callback address, anti-disguise information and an application key.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are provided for login and authorization. For example, a third-party terminal receives a login request from a user and sends an authorization request from the third-party terminal to a network server; the network server generates first two-dimensional-barcode information and sends the first two-dimensional-barcode information to the third-party terminal; the third-party terminal displays a first two-dimensional-barcode image; a mobile terminal extracts the first two-dimensional-barcode information from the first two-dimensional-barcode image and sends first user account information and the first two-dimensional-barcode information to the network server; the network server validates the first user account information and the first two-dimensional-barcode information based on at least information associated with stored second user account information and second two-dimensional-barcode information generated by the network server.
7 Citations
16 Claims
-
1. A method for login comprising:
-
receiving a login request from a user; sending an authorization request to a network server; receiving first two-dimensional-barcode information from the network server; displaying a first two-dimensional-barcode image; acquiring information related to a logged-in state of a user account from a third-party server; and setting an interface of a third-party application to a user-logged-in state; wherein the third-party server sets the user account to the logged-in state and sends the information related to the logged-in state of the user account after the network server validates user account information sent from a mobile terminal and the first two-dimensional-barcode information extracted from the first two-dimensional-barcode image; wherein; the authorization request includes authorization parameters to be validated by the network server; and the authorization parameters include an application identifier, authorization scope information, an application callback address, anti-disguise information and an application key. - View Dependent Claims (2, 3)
-
-
4. A method for authorization comprising:
-
receiving an authorization request from a third-party terminal; generating first two-dimensional-barcode information; sending the first two-dimensional-barcode information to the third-party terminal so that the third-party terminal displays a first two-dimensional-barcode image; validating user account information and the first two-dimensional-barcode information sent from a mobile terminal based on at least information associated with stored user account information and second two-dimensional-barcode information, wherein the first two-dimensional-barcode information sent from the mobile terminal is extracted by the mobile terminal from the first two-dimensional-barcode image displayed on the third-party terminal; and in response to the user account information and the first two-dimensional-barcode information being validated, sending an authorization and a predetermined user identifier to the third-party server; wherein; the authorization request includes authorization parameters; and the authorization parameters include an application identifier, authorization scope information, an application callback address, anti-disguise information and an application key. - View Dependent Claims (5, 6, 7, 8, 9)
-
-
10. A network server comprising:
-
an authorization-request-receiving unit configured to receive an authorization request from a third-party terminal; a two-dimensional-barcode-generation unit configured to generate first two-dimensional-barcode information; a two-dimensional-barcode-sending unit configured to send the first two-dimensional-barcode information to the third-party terminal so that the third-party terminal displays a first two-dimensional-barcode image; a validation-information-receiving unit configured to receive user account information and the first two-dimensional-barcode information from a mobile terminal; a validation unit configured to validate the user account information and the first two-dimensional-barcode information based on at least information associated with stored user account information and second two-dimensional-barcode information generated by the two-dimensional-barcode-generation unit, wherein the first two-dimensional-barcode information sent from the mobile terminal is extracted by the mobile terminal from the first two-dimensional-barcode image displayed on the third-party terminal; and an authorization-information-sending unit configured to, in response to the user account information and the first two-dimensional-barcode information being validated, send an authorization and a predetermined user identifier to the third-party server; wherein; the authorization request includes authorization parameters; and the authorization parameters include an application identifier, authorization scope information, an application callback address, anti-disguise information and an application key. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification